隱操 的英文怎麼說

中文拼音 [yǐncāo]
隱操 英文
implied operand
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  1. To support html form actions and static hidden fields

    以支持html表單作和靜態(藏)欄位。
  2. A web application requires protection for vulnerabilities on page static data ; for example form action, links, buttons, and hidden fields

    Web應用程序要求保護頁面靜態數據中的漏洞,如作、鏈接、按鈕和藏欄位。
  3. Then they have good opportunities to make choices between to remain perilous freedom in state of nature and to become safe servitude in a sovereign state. ( 2 ) hobbesian predicament existed in various kinds of human life with different scales and component of disorder

    政治、主權者與國家的產生,源自無法消弭的人之恐懼和驕傲而起的沖突,只能以法律的威嚇與教育的情養成和轉化,以掌控與匿其與人性上之因果。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  5. 3. finally, according to the demand of the research project, the steganography programs downloaded from internet are integrated to be a practical system. it has simple and perspicuous interface, easy to operate

    最後我們將已經收集到的藏工具予以集成,對每個工具都有詳細的說明,並對不同的dos程序採用統一的輸入界面,形成一個系統的藏工具體系,其界面明了簡單,用戶可以很容易作並掌握。
  6. During the procedure of system design and implementation, the author has made some innovative efforts such as : ( d establishing the user interest orientated model, the model receiving user interests continuously and conjecturing user interests by interaction with the user, accumulating user preferences in information demand, thereby achieving self - adaptive retrieval, ? roviding a feedback method which is based on the human - machine interaction, summarizing the user operations on the interface of result presentation, and designing an algorithm for capturing user operation behaviors, by which the changes in user interests and preferences can be learned potentially, ? ffering a method for user interest mining which can extract subjects of information confirmed by user, thereby conjecturing or predicting different kinds of expressions of the same interest or extracting the new interests or unexpressed interests, ? roposing a solution of personalized internet information retrieval based on the user interests in accordance with the above - mentioned work, the solution having very strong feasibility and practicality with taking user interest model as center, employing machine learning ( active learning and passive learning ) and data mining as tools, and being assisted with network robot,

    Piirs系統分析與設計過程中所做的創新性的嘗試主要有以下幾個方面:實現了基於用戶興趣的用戶模型,該模型通過與用戶的交互(主動交互和被動交互) ,不斷地接收用戶的興趣和推測用戶的興趣,積累用戶信息需求的偏好,實現自適應的檢索;提供了一種基於人機交互的反饋方法,對用戶在結果呈現界面上的作進行了歸納總結,設計了用戶作捕獲演算法, 「性地」學習用戶興趣和偏好的變化;提供了一種用戶需求挖掘的方法,對用戶已確定的信息做進一步的主題挖掘,由此推測或預測用戶同一興趣的不同表述方式或者挖掘出用戶新的或未表達出來的興趣;在上述工作基礎上提出了一套完整的基於用戶興趣的個性化網路信息檢索的解決方案,該方案以用戶興趣模型為中心,以機器學習(主動學習和被動學習)和數據挖掘為手段,輔以網路機器人,具有很強的可行性和實用性。
  7. The wga wants a statement at the beginning of each programme identifying any product placement so viewers are not " subject to hidden or stealth advertising "

    Wga要求每個節目前都應該有一份聲明,列出每一件置入節目中的商品,視聽大眾才不會被而不顯的廣告手法所弄。
  8. Is actually the driving service behind both the push and pull models ; however, in the latter case it operates implicitly

    實際上是推模型和拉模型背後的驅動服務;但在拉模型中它是作的。
  9. Operations guide : click play entered the game, select the first one, the use of sub analogy, you have a portrait of two chutes, blue for health, yellow for the physical, a key to the roundabout hack, and s keys to normal hack, and d keys to xiapi, with the normal direction of the same key, k enter the name of the game : welcome 4455 miniclip games network, the site domain name to remember : 4455. cc and 3839. cc

    作指南:點擊play進入游戲,選擇第一關,以次類推,你的頭像有兩個槽,藍色為健康,黃色為體力a鍵為迴旋砍, s鍵為正常砍, d鍵為下劈,方向鍵與正常相同,空格鍵為撞擊對手,游戲中還會有4片金子收藏,游戲后會獲得積分啊:此外,打碎一些箱子會有救命藥水來補充,其中黃色藥水是體力補充,使用時按數字小鍵盤的「 1 」 ,藍色藥水是健康補充,按「 2 」 ,紫色藥水為身,按「 3 」即可,有時間限制的,可以看你的頭像啊。
  10. In this text, we first do some research on the genetic algorithm about clustering, discuss about the way of coding and the construction of fitness function, analyze the influence that different genetic manipulation do to the effect of cluster algorithm. then analyze and research on the way that select the initial value in the k - means algorithm, we propose a mix clustering algorithm to improve the k - means algorithm by using genetic algorithm. first we use k - learning genetic algorithm to identify the number of the clusters, then use the clustering result of the genetic clustering algorithm as the initial cluster center of k - means clustering. these two steps are finished based on small database which equably sampling from the whole database, now we have known the number of the clusters and initial cluster center, finally we use k - means algorithm to finish the clustering on the whole database. because genetic algorithm search for the best solution by simulating the process of evolution, the most distinct trait of the algorithm is connotative parallelism and the ability to take advantage of the global information, so the algorithm take on strong steadiness, avoid getting into the local

    本文首先對聚類分析的遺傳演算法進行了研究,討論了聚類問題的編碼方式和適應度函數的構造方案與計算方法,分析了不同遺傳作對聚類演算法的性能和聚類效果的影響意義。然後對k - means演算法中初值的選取方法進行了分析和研究,提出了一種基於遺傳演算法的k - means聚類改進(混合聚類演算法) ,在基於均勻采樣的小樣本集上用k值學習遺傳演算法確定聚類數k ,用遺傳聚類演算法的聚類結果作為k - means聚類的初始聚類中心,最後在已知初始聚類數和初始聚類中心的情況下用k - means演算法對完整數據集進行聚類。由於遺傳演算法是一種通過模擬自然進化過程搜索最優解的方法,其顯著特點是含并行性和對全局信息的有效利用的能力,所以新的改進演算法具有較強的穩健性,可避免陷入局部最優,大大提高聚類效果。
  11. Safety and easy operation : hidden air leaking hole for opening fixture cover easily while pulling up hand lever of the upper cover

    作方便,安全:藏式?氣孔,拉起上蓋把手即可打開治具,作簡易,安全性高。
  12. Furthermore, by introducing the new means of the principal ' s manipulation of information, we highlight the function of the implicit discrimination mechanism, and show that it dominates the explicit mechanism

    進一步地,通過引入委託人對資訊的縱,我們揭示了性的歧視機制的作用,並且證明了它優于顯性的歧視機制。
  13. Soft client server is secretly installed on isp, wan, host computer of important and sensitive part needed to be controlled to collect network data. after transmitting in real - time to email monitor center, pop3, information such as smtp and web - mail from these data are analysis and retrievable, password intercepted, classified and alert, mean wile the center can monitor in real - time on over 1000 nodes by controlling working status and filter condition and software refreshment etc. the system occupies less than 4 percent of system recourse under the condition of without losing package

    客戶端採用蔽式安裝方式在需要控制的敏感地區的isp 、局域網、網吧以及上網主機上安裝,對進出的網路數據進行採集,然後將採集的數據實時發送至電子郵件監控中心,電子郵件監控中心對這些數據中的pop3 、 smtp以及web - mail電子郵件信息進行分析還原、口令截獲、歸類及報警,並根據情況對客戶端的工作狀態、過濾條件、軟體更新等進行控制作,從而實現了對高速網路( 100mbps以上) 、 10000個監控節點以上網路數據的實時有效監控。
  14. If can stipulate according to law the program is operated, because lose brings hidden trouble carelessly, put an end to

    若能按照法律規定程序作,就杜絕了因不慎丟失所帶來的患。
  15. Wang lung - five thesaurus free version applicable to all operating systems and can be articulated large thesaurus, no hidden weight code, automatically adds the code can not use strokes, quanpin inputs, automatic word and most other functions there, many restrictions

    龍文五筆王小詞庫免費版適用於各種作系統,可以掛接大的詞庫,沒有重碼藏、自動添加編碼,不能使用雙拼、簡拼輸入等,其中自動加詞等大部分功能都有,限制不多。
  16. Finally, it analyzes the current security malpractices and universal security protection measures that ec faced. it put forward a security e - mail way that based on smart card, especially in improving on set protocol. and it also discusses the security capability of desktop operation system, gives the security user login management of windows 98 that based on smart card

    本文的最後部分分析了當前電子商務領域所面臨的安全患和通用的安全防護措施,提出了基於智能卡的安全電子郵件的解決方案,並重點改進了set協議,分析了安全桌面作系統的安全性,實現了基於智能卡的windows98的安全用戶登錄管理。
  17. The utilization of kanban system may radically remove the hidden troubles in the course of manufacturing, constantly reduce the scrap and improve and stabilize the product ' s quality, which will result in shortened lead time, flexibility of production as well as low inventory. it may also promote the manufacturing system to form a multi - skill operation team and have the product ' s design and development be guided by the customer ' s requirement, meanwhile promote the producer to build up a friendly relationship with its supplier so that the manufacturing enterprise becomes more competitive and stronger than its rival

    看板管理在生產製造的運用能從根本上消除生產製造過程中存在的各種患;使生產過程的報廢不斷降低,使產品質量不斷提高和穩定;使產品生產周期不斷縮短,使生產更加柔性化,同時降低庫存;促使生產製造系統形成一支多技能的作隊伍;使產品研究開發更能以顧客需求為導向;促使生產廠家不斷改善與供應商的關系,從而使製造企業具有任何對手也打不跨的競爭力。
  18. In tracing the steps of government mind control experiments, the trail leads to legal and illegal usages, usage for covert intelligence operations, and experiments on innocent people who were unaware that they were being used

    在跟隨政府精神控制實驗步驟中,這個跟隨過程導致了合法和非法的使用,用於藏了秘密情報的作,而實驗也用於無辜的人類,而他們並沒有意識到他們正被利用著。
  19. " as hackers sometimes take advantage of the holidays to launch their malicious programmes by concealing their viruses in festive greeting notes, parents should show their children how to guard against unauthorised intrusions into their system and ensure that they abide by the ethics and regulations on the proper use of computers and access to the cyber world on the internet

    由於黑客有時會利用假期發動惡意程式,把這些病毒藏於節日祝賀郵件內,家長應該教導子女怎樣保護系統免受未經授權的入侵,並確保他們遵守正確使用電腦及在上網的道德守和規則。
  20. The implicit research on childen modality effect implicit memory is a highlight in memory research. the implicit and explicit memory tasks were investigated by manipulating the modality variable to supply the empirical support for the implicit memory theory

    縱視聽通道變量對幼兒內和外顯兩種記憶任務的成績進行研究,可以為探求內記憶理論解釋提供實證依據。
分享友人